d.lmaxglbe.xyz
Open in
urlscan Pro
103.118.81.27
Malicious Activity!
Public Scan
Submission Tags: 7265483
Submission: On August 16 via api from NL
Summary
TLS certificate: Issued by R3 on August 16th 2021. Valid for: 3 months.
This is the only time d.lmaxglbe.xyz was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: LMAX Group (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
7 | 103.118.81.27 103.118.81.27 | 137962 (GREYPANEL...) (GREYPANEL-AS137962 GREYPANEL PTE LTD) | |
1 | 13.75.55.233 13.75.55.233 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
8 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
lmaxglbe.xyz
d.lmaxglbe.xyz |
212 KB |
1 |
lmaxglb.com
h5.lmaxglb.com |
78 KB |
8 | 2 |
Domain | Requested by | |
---|---|---|
7 | d.lmaxglbe.xyz |
d.lmaxglbe.xyz
|
1 | h5.lmaxglb.com |
d.lmaxglbe.xyz
|
8 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.zwt972.com |
dpp.wwjkkq.com |
d.apks13923.xyz |
d.apks82571.xyz |
Subject Issuer | Validity | Valid | |
---|---|---|---|
lmaxglbe.xyz R3 |
2021-08-16 - 2021-11-14 |
3 months | crt.sh |
*.lmaxglb.com R3 |
2021-08-16 - 2021-11-14 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://d.lmaxglbe.xyz/?id=b6cb467d3ce6322cc73dff4a43986100
Frame ID: E11773CA7423A2FD6782DE0962C54AC8
Requests: 8 HTTP requests in this frame
Screenshot
Detected technologies
Lua (Programming Languages) ExpandDetected patterns
- headers server /openresty(?:\/([\d.]+))?/i
Nginx (Web Servers) Expand
Detected patterns
- headers server /openresty(?:\/([\d.]+))?/i
OpenResty (Web Servers) Expand
Detected patterns
- headers server /openresty(?:\/([\d.]+))?/i
Page Statistics
4 Outgoing links
These are links going to different origins than the main page.
Title: IOS Download
Search URL Search Domain Scan URL
Title: IOS Download
Search URL Search Domain Scan URL
Title: Android Download 1
Search URL Search Domain Scan URL
Title: Android Download 2
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
d.lmaxglbe.xyz/ |
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
d.lmaxglbe.xyz/stylesheets/ |
6 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
index.js
d.lmaxglbe.xyz/js/ |
1 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
6116190d71f497678317228042366.png
h5.lmaxglb.com/app-img/img/ |
78 KB 78 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
phone5.png
d.lmaxglbe.xyz/images/ |
24 KB 25 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
multi.png
d.lmaxglbe.xyz/images/ |
31 KB 32 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ecosystem.png
d.lmaxglbe.xyz/images/ |
30 KB 31 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
intro.png
d.lmaxglbe.xyz/images/ |
119 KB 120 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: LMAX Group (Financial)13 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated function| onDownloadLight function| backClick0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
d.lmaxglbe.xyz
h5.lmaxglb.com
103.118.81.27
13.75.55.233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